How our technology works

1. Prepare

Cyan Forensics’ tools require a preparation step which extracts a special type of ‘digital fingerprint’ called a Contraband Filter from an existing database of contraband material. For a Child Sexual Exploitation (CSE) investigation this might be a database of illegal images. For a Counter Terrorism (CT) investigation this might be bomb-making manuals or extremist material used in radicalisation.

The Contraband Filter is a secure format that can be searched very rapidly.

2. Triage

Cyan Forensics’ tools, combined with a pre-prepared Contraband Filter are used to scan seized computers, hard drives and media devices (or forensic images of them) for contraband. Our tools deliver results in minutes, identifying those devices that contain contraband and those that almost certainly do not—and are fast enough to use in on-site triage, or for getting fast results at the lab within the custody window.

Scanning 80Gb HDD

Cyan Forensics: 2 minutes1%

1%

MD5: 35 minutes8%

8%

Scanning 1Tb HDD

Cyan Forensics: 27 minutes6%

6%

MD5: 7 hours 30 minutes99%

99%

3. Investigate

Our tools provide rapid results that allow forensic analysts to focus their investigative efforts on devices that are likely to yield useful evidence, and to avoid wasting time on devices that do not contain anything incriminating.

Our tools provide a new “quick look” and prioritisation capability without changing well established processes, or interfering with the tools for a full forensic examination that provides detailed evidence for use in court.